Abstract
Internet becomes more and more popular, and most companies and institutes use web services for e-business and many other purposes. As results, Internet and web services become core infrastructure for a company or an institute and become more and more important. With the explosion of Internet, the occurrence of cyber terrorism has grown very rapidly. It is difficult to find and close all security flaws in a computer system that is connected to a network. Internet worms take advantages of these security flaws, and attack a large number of hosts with self-propagating techniques.
It is quite challenging to simulate very large-scale worm attacks. This paper propose a hybrid model for large-scale simulations, and the proposed model will be both detailed enough to generate realistic packet traffic, and efficient enough to model a worm spreading through the Internet.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lala, C., Panda, B.: Evaluating damage from cyber attacks: A model and analysis. IEEE Transactions on Systems, Man and Cybernetics 31, 300–310 (2001)
Center, C.C.: CERT advisories (2004), http://www.cert.org/advisories/
Liljenstam, M., et al.: Simulating realistic network worm traffic for worm warning system design and testing. In: Proceedings of the 2003 ACM workshop on Rapid Malcode, pp. 24–33. ACM Press, New York (2003)
Perumalla, K.S., Sundaragopalan, S.: High-fidelity modeling of computer netowrk worms. In: Proceedings of the 20th Annual Computer Security Applications Conference (2004)
Liu, B., et al.: A study of networks simulation efficiency: Fluid simulation vs. packet-level simulation. In: Proceedings of the Twentieth Annual Joint Conference of the IEEE Computer and Comunications Societies (INFOCOM), pp. 1244–1253 (2001)
Kiddle, C., et al.: Hybrid packet/fluid flow network simulation. In: Proceedings of the Seventeenth Workshop on Parallel and Distributed Simulation (PADS’03) (2003)
Mostow, J.R., Roberts, J.D., Bott, J.: Integration of an internet attack simulator in an HLA environment. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, West Point, NY (2001)
Welch, D., Conti, G., Marin, J.: A framework for an information warfare simulation. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, West Point, NY (2001)
Breslau, L., et al.: Advances in network simulation (Expanded version available as USC TR 99-702b). IEEE Computer 33, 59–67 (2000)
Technology, O.: Opnet modeler (2001)
Yun, J.B., et al.: A scalable, ordered scenario-based network security simulator. In: Baik, D.-K. (ed.) AsiaSim 2004. LNCS (LNAI), vol. 3398, Springer, Heidelberg (2005)
Gu, Y., Liu, Y., Towsley, D.: On integrating fluid models with packet simulation. In: Proceedings of the IEEE INFOCOM (2004)
Zeng, X., Bagrodia, R., Gerla, M.: GloMoSim: A library for parellel simulation of large-scale wireless networks. In: Proceedings of the 12th Workshop on Parallel and Distributed Simulation, pp. 154–161 (1998)
Melamed, B., Pan, S., Wardi, Y.: Hybrid discrete-continuous fluid-flow simulation. In: Proceedings of ITCOM 2001, Scalability and Traffic Control in IP Networks (2001)
Moore, D., et al.: Inside the slammer worm. IEEE Security & Privacy 1, 33–39 (2003)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Im, E.G., Kim, J.S., Noh, I.W., Jang, H.J. (2007). A Hybrid Model for Worm Simulations in a Large Network. In: Yang, C.C., et al. Intelligence and Security Informatics. PAISI 2007. Lecture Notes in Computer Science, vol 4430. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71549-8_32
Download citation
DOI: https://doi.org/10.1007/978-3-540-71549-8_32
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-71548-1
Online ISBN: 978-3-540-71549-8
eBook Packages: Computer ScienceComputer Science (R0)